Skip to main content
  • Conference proceedings
  • © 2009

Security Technology

International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

Part of the book series: Communications in Computer and Information Science (CCIS, volume 58)

Conference series link(s): SecTech: International Conference on Security Technology

Conference proceedings info: SecTech 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (37 papers)

  1. Front Matter

  2. Applications of Reversible Data Hiding Techniques with the Quick Response Codes

    • Hsiang-Cheh Huang, Feng-Cheng Chang, Wai-Chi Fang
    Pages 1-8
  3. A New Approach in T-FA Authentication with OTP Using Mobile Phone

    • Abdulaziz S. Almazyad, Yasir Ahmad
    Pages 9-17
  4. A Study on Secure Contents Using in Urban Computing

    • Hoon Ko, Jongmyung Choi, Carlos Ramos
    Pages 26-34
  5. Shadow Generation Protocol in Linguistic Threshold Schemes

    • Marek R. Ogiela, Urszula Ogiela
    Pages 35-42
  6. Analysis of Handwritten Signature Image

    • Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-hoon Kim
    Pages 43-50
  7. Hardware Based Data Inspection for USB Data Leakage Prevention

    • DongHo Kang, BoHeung Jung, KiYoung Kim
    Pages 57-63
  8. Grayscale Image Classification Using Supervised Chromosome Clustering

    • Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-hoon Kim
    Pages 64-71
  9. Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models

    • Linda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer
    Pages 72-85
  10. Impact of Malicious Node on Broadcast Schemes

    • Aneel Rahim, Fahad bin Muyaha
    Pages 86-92
  11. Hierarchical Identity-Based Identification Schemes

    • Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi
    Pages 93-99
  12. The Trend of the Security Research for the Insider Cyber Threat

    • Jaeseung Hong, Jongwung Kim, Jeonghun Cho
    Pages 100-107
  13. MIMO Wiretap Channel: A Scalar Approach

    • Mohammad Rakibul Islam, Jinsang Kim
    Pages 108-115
  14. Security Testing for Operating System and Its System Calls

    • Gaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, Hengsheng Yang
    Pages 116-123
  15. Efficient Group Signature with Forward Secure Revocation

    • Haimin Jin, Duncan S. Wong, Yinlong Xu
    Pages 124-131
  16. Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion

    • Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu
    Pages 132-139
  17. Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code

    • Tie-Ming Liu, Lie-hui Jiang, Hong-qi He, Ji-zhong Li, Xian Yu
    Pages 140-147
  18. Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code

    • Yonglong Wei, Xiaojuan Zheng, Jinglei Ren, Xudong Zheng, Chen Sun, Zhenhao Li
    Pages 148-156

Other Volumes

  1. Security Technology

About this book

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).

Editors and Affiliations

  • University of Warsaw & Infobright Inc.,, Poland

    Dominik Ślęzak

  • Hannam University, Daejeon, South Korea

    Tai-hoon Kim

  • National Chiao Tung University, Hsinchu, Taiwan

    Wai-Chi Fang

  • Mississippi State University, USA

    Kirk P. Arnett

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access